You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
In this second volume, starting with the Caliphate of Banu Umayyah, the martyrdom of Imam Husain (R) and the Caliphate of the Abbasids, all areas have been covered as far as the expansion of Islam was. --Publisher description.
This book covers the proceedings of ICISSI 2022 (International Conference on Intelligent Systems and Smart Infrastructure) held at Prayagraj, Uttar Pradesh during April 21–22, 2022. The conference was jointly organised by Shambhunath Institute of Engineering and Technology, Prayagraj UP India, Institute of Engineering and Technology (IET) Lucknow, U.P India, and Manipal University Jaipur, Rajasthan India with an aim to provide a platform for researchers, scientists, technocrats, academicians and engineers to exchange their innovative ideas and new challenges being faced in the field of emerging technologies. The papers presented in the conference have been compiled in form of chapters to focus on the core technological developments in the emerging fields like machine learning, intelligence systems, smart infrastructure, advanced power technology etc.
The rapid increase of web pages has introduced new challenges for many organizations as they attempt to extract information from a massive corpus of web pages. Finding relevant information, eliminating irregular content, and retrieving accurate results has become extremely difficult in today’s world where there is a surplus of information available. It is crucial to further understand and study web mining in order to discover the best ways to connect users with appropriate information in a timely manner. Advanced Practical Approaches to Web Mining Techniques and Application aims to illustrate all the concepts of web mining and fosters transformative, multidisciplinary, and novel approaches that introduce the practical method of analyzing various web data sources and extracting knowledge by taking into consideration the unique challenges present in the environment. Covering a range of topics such as data science and security threats, this reference work is ideal for industry professionals, researchers, academicians, practitioners, scholars, instructors, and students.
Social media has revolutionized how individuals, communities, and organizations create, share, and consume information. Similarly, social media offers numerous opportunities as well as enormous social and economic ills for individuals, communities, and organizations. Despite the increase in popularity of social networking sites and related digital media, there are limited data and studies on consumption patterns of the new media by different global communities. Analyzing Global Social Media Consumption is an essential reference book that investigates the current trends, practices, and newly emerging narratives on theoretical and empirical research on all aspects of social media and its global use. Covering topics that include fake news detection, social media addiction, and motivations and impacts of social media use, this book is ideal for big data analysts, media and communications experts, researchers, academicians, and students in media and communications, information systems, and information technology study programs.
Link prediction is required to understand the evolutionary theory of computing for different social networks. However, the stochastic growth of the social network leads to various challenges in identifying hidden links, such as representation of graph, distinction between spurious and missing links, selection of link prediction techniques comprised of network features, and identification of network types. Hidden Link Prediction in Stochastic Social Networks concentrates on the foremost techniques of hidden link predictions in stochastic social networks including methods and approaches that involve similarity index techniques, matrix factorization, reinforcement, models, and graph representations and community detections. The book also includes miscellaneous methods of different modalities in deep learning, agent-driven AI techniques, and automata-driven systems and will improve the understanding and development of automated machine learning systems for supervised, unsupervised, and recommendation-driven learning systems. It is intended for use by data scientists, technology developers, professionals, students, and researchers.
THE PAKISTAN MCQ (MULTIPLE CHOICE QUESTIONS) SERVES AS A VALUABLE RESOURCE FOR INDIVIDUALS AIMING TO DEEPEN THEIR UNDERSTANDING OF VARIOUS COMPETITIVE EXAMS, CLASS TESTS, QUIZ COMPETITIONS, AND SIMILAR ASSESSMENTS. WITH ITS EXTENSIVE COLLECTION OF MCQS, THIS BOOK EMPOWERS YOU TO ASSESS YOUR GRASP OF THE SUBJECT MATTER AND YOUR PROFICIENCY LEVEL. BY ENGAGING WITH THESE MULTIPLE-CHOICE QUESTIONS, YOU CAN IMPROVE YOUR KNOWLEDGE OF THE SUBJECT, IDENTIFY AREAS FOR IMPROVEMENT, AND LAY A SOLID FOUNDATION. DIVE INTO THE PAKISTAN MCQ TO EXPAND YOUR PAKISTAN KNOWLEDGE AND EXCEL IN QUIZ COMPETITIONS, ACADEMIC STUDIES, OR PROFESSIONAL ENDEAVORS. THE ANSWERS TO THE QUESTIONS ARE PROVIDED AT THE END OF EACH PAGE, MAKING IT EASY FOR PARTICIPANTS TO VERIFY THEIR ANSWERS AND PREPARE EFFECTIVELY.
As technology continues to expand and develop, the internet of things (IoT) is playing a progressive role in the infrastructure of electronics. The increasing amount of IoT devices, however, has led to the emergence of significant privacy and security challenges. Security and Privacy Issues in Sensor Networks and IoT is a collection of innovative research on the methods and applications of protection disputes in the internet of things and other computing structures. While highlighting topics that include cyber defense, digital forensics, and intrusion detection, this book is ideally designed for security analysts, IT specialists, software developers, computer engineers, industry professionals, academicians, students, and researchers seeking current research on defense concerns in cyber physical systems.
Artificial Intelligence and Machine Learning in Smart City Planning shows the reader practical applications of AIML techniques and describes recent advancements in this area in various sectors. Owing to the multidisciplinary nature, this book primarily focuses on the concepts of AIML and its methodologies such as evolutionary techniques, neural networks, machine learning, deep learning, block chain technology, big data analytics, and image processing in the context of smart cities. The text also discusses possible solutions to different challenges posed by smart cities by presenting cutting edge AIML techniques using different methodologies, as well as future directions for those same techniques. - Reviews the smart city concept and teaches how it can contribute to achieving urban development priorities - Explains soft computing techniques for smart city applications - Describes how to model problems for effective analysis, intelligent decision making, and optimal operation and control in the smart city paradigm - Teaches how to carry out independent projects using soft computing techniques in a vast range of areas in diverse fields like engineering, management, and sciences
A practical guide to the design, implementation, evaluation, and deployment of emerging technologies for intelligent IoT applications With the rapid development in artificially intelligent and hybrid technologies, IoT, edge, fog-driven, and pervasive computing techniques are becoming important parts of our daily lives. This book focuses on recent advances, roles, and benefits of these technologies, describing the latest intelligent systems from a practical point of view. Fog, Edge, and Pervasive Computing in Intelligent IoT Driven Applications is also valuable for engineers and professionals trying to solve practical, economic, or technical problems. With a uniquely practical approach spanni...